Site icon Eminence Papers

Project Analysis Plan for SNHUEnergy, Inc.: Network Architecture Assessment

Project Analysis Plan for SNHUEnergy, Inc.: Network Architecture Assessment

The existing network architecture for SNHUEnergy, Inc. has become instrumental in sustaining the organization’s functioning between the offices located in Dallas and Memphis. A telecommunication suitability analysis of the network reliability, security, and capacities to support the expected future development is also done to determine enhancements. Sustainable network architecture is now more significant because organizational needs are changing, which means that the facilities translating these demands must support availability, scalability, and secure transport of data from one application and location to another (Borgianni et al., 2024; Al-Khateeb et al., 2010).

Network Applications

SNHUEnergy’s network caters to all the applications of each office, which implies that each office has some specialized functions compared to the Dallas and Memphis offices. The Payroll, Accounting, HR, and Email applications are managed from the Dallas office, which holds around 90 employees and operates as a business equivalent. Queue, in contrast, the Memphis office assists with billing and operational applications for 30 people. The two operate video conferencing and VoIP telephone systems, demonstrating the significance of real-time dealings and data sharing within the network. Since each depends on a stable network, any volatility would impact essential workings; thus, the increasing importance of network redundancy and robustness in their structure (Borgianni et al., 2024; Liu & Song, 2020).

OSI Model Identification and Labelling

Applying the OSI model framework to SNHUEnergy’s infrastructure provides insights into the roles of each network component:

  1. Physical Layer: This layer involves the actual hardware components like cables and connectors that transmit raw data. These endpoints serve as the backbone for connecting devices within and between offices.
  2. Data Link Layer: Switches facilitate local device communication within each office.
  3. Network Layer: Routers manage data packets, enabling communication between the Dallas and Memphis offices and external networks.
  4. Transport Layer: This layer ensures reliable data transmission, particularly for applications like payroll and billing.
  5. Session Layer: Maintains sessions essential for video conferencing applications, supporting continuity in communication.
  6. Presentation Layer: Manages data format compatibility, which is crucial for cross-office file sharing.
  7. Application Layer: Hosts end-user applications, including email, payroll, and accounting systems.

Additional Devices

Firewalls: Operate across multiple layers, typically at the Network (Layer 3), Transport (Layer 4), and Application (Layer 7) layers. They monitor and filter incoming and outgoing traffic based on security rules, providing an essential defense against unauthorized access.

Wireless Access Points (WAPs): Function at the Data Link Layer (Layer 2). They provide a wireless connection for devices to join the network, facilitating communication without physical cables.

The present architecture provides a basis for service delivery; however, the identified risks can intrinsically limit substantial growth should they remain uncompensated (Mukherjee et al., 2014).

Component Description

Routers

Every office employs one router for the interconnection of internal appliances with the overall network and other offices’ links. Routers are part of the network infrastructure, and their failure could hinder data transfer from one office to another. Scaling up the router redundancy is essential as the current design may contain possible single point of failure issues (Liu & Song, 2020). The router facilitates communication between different networks and network segments, allowing data to flow between the Dallas and Memphis offices and other external networks. It serves as the network’s backbone, ensuring data packets reach their intended destination across interconnected networks.

Switches

The switch connects devices within each office’s local network, creating a network segment that enables direct communication among connected devices. The switch organizes data flow within the local network to support efficient internal connectivity. Switches interconnect devices within each local network to facilitate the transmission of data and resource sharing between the offices. Dallas uses two switches that offer some form of redundancy, but Memphis relies on only one switch; therefore, it is vulnerable to service disruptions if the switch fails, which calls for redundancy improvements (Peng et al., 2011).

Firewalls

At present, a firewall has been installed in the Dallas office that can be considered the primary layer of defense against intrusion. However, the Memphis office lacks firewall protection, which may lead to a security issue. Implementing firewalls at both places can enhance overall security, especially with regard to payroll and billing information. Acting as a security device, the firewall monitors and controls incoming and outgoing network traffic based on predefined security rules. It allows or blocks data packets between network segments, adding a layer of protection to sensitive data, such as payroll and billing information. The firewall primarily functions as a traffic monitoring tool to prevent unauthorized access.

Wireless Access Point (WAP)

Similar to a switch, the WAP enables devices to connect to the network but uses radio signals instead of physical cables. It provides a wireless connection point within the network, allowing mobile and wireless devices to access network resources securely.

Network Analysis

The network architecture allows for inter-office connectivity and supports business-critical applications, yet the structure presents notable vulnerabilities:

Inter-Office Connectivity Risks

The use of a single router between offices is deemed risky if the connection is split. Communication-intensive, business-critical applications like billing and HR interoffices would be severely impacted, putting essential operations at both offices at risk (Furdek et al., 2016).

Hardware Limitations in Memphis

As such, problems may be encountered in the Memphis office, where the office uses a single router and a single switch, providing no hardware redundancy. Establishing backup components is essential in Memphis in case of a hardware failure, as this disrupts the operations (Borgianni et al., 2024).

Firewall Security Gaps

While Dallas still has a firewall, Memphis is not shielded from attacks, which could jeopardize the whole SNHUEnergy network. This way, the company could independently create a more secure network of firewall solutions used at the two sites, thereby protecting the network (Mukherjee et al., 2014).

Project Summary

With SNHUEnergy, this is an assessment of the current capabilities and weaknesses of the network in terms of scalability, security, and redundancy. The objective is to create a long-term network that would solve the growth problem and strengthen the security and reliability of operations. A future deliverable of this project will outline an infrastructure well-suited to all offices within SNHUEnergy while maintaining sophisticated security measures to protect the safety of SNHUEnergy’s personnel and property and ensuring that all networks across the company remain stable.

References

Al-Khateeb, W., Al-Irhayim, S., & Al-Khateeb, K. (2010, May). Reliability enhancement of complex networks through redundancy scaling. In International Conference on Computer and Communication Engineering (ICCCE’10) (pp. 1–6). IEEE. https://doi.org/10.1109/ICCCE.2010.5556788

Borgianni, L., Adami, D., Giordano, S., & Pagano, M. (2024). Enhancing reliability in rural networks using a software-defined wide area network. Computers13(5), 113. https://doi.org/10.3390/computers13050113

Furdek, M., Wosinska, L., Goścień, R., Manousakis, K., Aibin, M., Walkowiak, K., & Marzo, J. L. (2016, September). An overview of security challenges in communication networks. In 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM) (pp. 43-50). IEEE. https://doi.org/10.1109/RNDM.2016.7608266

Liu, W., & Song, Z. (2020). Review of studies on the resilience of urban critical infrastructure networks. Reliability Engineering & System Safety193, 106617. https://doi.org/10.1016/j.ress.2019.106617

Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials16(3), 1550–1573. https://doi.org/10.1109/SURV.2014.012314.00178

Peng, P., Snyder, L. V., Lim, A., & Liu, Z. (2011). Reliable logistics networks design with facility disruptions. Transportation Research Part B: Methodological45(8), 1190-1211. https://doi.org/10.1016/j.trb.2011.05.022

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


IT 640 Milestone One Guidelines and Rubric


Overview
Within an organization, the dependability of network infrastructures has become a top priority. You must have a systems thinking mindset and be able to properly develop an analysis plan to understand the fundamentals of how this infrastructure works within an organization. You have been tasked with analyzing the current network architecture of a hypothetical organization called SNHUEnergy, Inc. You are to determine any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of SNHUEnergy’s business. You will provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization
prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.

Prompt
For this milestone, you will create a project analysis plan. Your plan will identify the network applications of the current network including a description of how the current network is designed by explaining how the different layers of the open systems interconnection (OSI) model relate to each other within the network.
Refer to the following files when completing this milestone:

Specifically, the following critical elements must be addressed:


What to Submit
Your assignment should be 1 to 2 pages in length with double spacing and should conform to academic writing standard expectations for mechanics, content organization, and use of APA
style

Exit mobile version